SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Electronic Credentials Advisor: Dr. Alex Wiesmaier
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
X.509 certificates ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
X.509 certificates - Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
X.509 certificates - Extensions ,[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
ISO/IEC 7816-8  certificates / Card verifiable certificates (CVC) ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Single-sign-on (SSO) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Security Assertion Markup Language (SAML) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Security Assertion Markup Language (SAML) - Assertions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
OpenID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://bob_smith.myopenid.com 16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
OpenID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials - HSM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials - HSM 16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hardware based credentials – Smart Cards  ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials – Smart Cards  ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials – Smart Cards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials – Authentication with Smart Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials – Smart Tokens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials  SecureID Card ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Hardware based credentials - News 16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison  Software based credentials ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison  Vulnerabilities of OpenID ,[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison Attacks against OpenID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison Attacks against OpenID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison Vulnerabilities of SAML ,[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison Attacks against SAML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison Attacks against SAML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison Attacks against SAML ,[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison Range of applications ,[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison  Hardware based credentials ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison  Magnetic card‘s vulnerabilities ,[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison  Chip card‘s vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison  Range of applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Comparison  HW vs. SW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Conclusion and future work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
Questions??? 16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi
References ,[object Object],[object Object],[object Object],[object Object],16/3/2011 | TUD | Department 20  | CDC  | Electronic Credentials  | S. Pöschel, A. Neziri & J. Budurushi

Weitere ähnliche Inhalte

Was ist angesagt?

Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
Anuj Pawar
 
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport ImplementationFormal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
Vijay Pasupathinathan, PhD
 
Smart Card Research Presentation
Smart Card Research PresentationSmart Card Research Presentation
Smart Card Research Presentation
ncapitoni
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
ijait
 

Was ist angesagt? (20)

An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
An Online secure ePassport Protocol
An Online secure ePassport ProtocolAn Online secure ePassport Protocol
An Online secure ePassport Protocol
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
E-commerce: Smart Card, Debit card & Credit card
E-commerce: Smart Card, Debit card & Credit cardE-commerce: Smart Card, Debit card & Credit card
E-commerce: Smart Card, Debit card & Credit card
 
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport ImplementationFormal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
 
ePassport reloaded goes mobile
ePassport reloaded goes mobileePassport reloaded goes mobile
ePassport reloaded goes mobile
 
Smart Card Research Presentation
Smart Card Research PresentationSmart Card Research Presentation
Smart Card Research Presentation
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and Adoption
 
Smart cards
Smart cards Smart cards
Smart cards
 

Andere mochten auch

Software(runtime) attacks
Software(runtime) attacksSoftware(runtime) attacks
Software(runtime) attacks
Amir Neziri
 
NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료
봉조 김
 
Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
David Brossard
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
UT, San Antonio
 

Andere mochten auch (12)

ABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID SchemesABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID Schemes
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas GrossCCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
CCS\'08: Efficient Attributes For Anonymous Credentials - Thomas Gross
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
Software(runtime) attacks
Software(runtime) attacksSoftware(runtime) attacks
Software(runtime) attacks
 
NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료NFC(Near Field Communication) 세미나자료
NFC(Near Field Communication) 세미나자료
 
Attribute-based Authentication
Attribute-based AuthenticationAttribute-based Authentication
Attribute-based Authentication
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
 

Ähnlich wie Electronic credentials

Europe | EU Approach to Data Exchange (Carsten Schmidt)
Europe | EU Approach to Data Exchange (Carsten Schmidt)Europe | EU Approach to Data Exchange (Carsten Schmidt)
Europe | EU Approach to Data Exchange (Carsten Schmidt)
Corporate Registers Forum
 

Ähnlich wie Electronic credentials (20)

Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf2024_German_eID_02_Spoofing_PACE_final.pdf
2024_German_eID_02_Spoofing_PACE_final.pdf
 
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
 
Eurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulationEurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulation
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Smartcard
SmartcardSmartcard
Smartcard
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
Smart card based electronic passport system
Smart card based electronic passport systemSmart card based electronic passport system
Smart card based electronic passport system
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
From Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFrom Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESET
 
Electronic Passport Verification System using IOT
Electronic Passport Verification System using IOTElectronic Passport Verification System using IOT
Electronic Passport Verification System using IOT
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2ShareAccess Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
IS - User Authentication
IS - User AuthenticationIS - User Authentication
IS - User Authentication
 
Europe | EU Approach to Data Exchange (Carsten Schmidt)
Europe | EU Approach to Data Exchange (Carsten Schmidt)Europe | EU Approach to Data Exchange (Carsten Schmidt)
Europe | EU Approach to Data Exchange (Carsten Schmidt)
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Electronic credentials

  • 1. Electronic Credentials Advisor: Dr. Alex Wiesmaier
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Hardware based credentials - News 16/3/2011 | TUD | Department 20 | CDC | Electronic Credentials | S. Pöschel, A. Neziri & J. Budurushi
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Questions??? 16/3/2011 | TUD | Department 20 | CDC | Electronic Credentials | S. Pöschel, A. Neziri & J. Budurushi
  • 40. 16/3/2011 | TUD | Department 20 | CDC | Electronic Credentials | S. Pöschel, A. Neziri & J. Budurushi
  • 41.

Hinweis der Redaktion

  1. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  2. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  3. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  4. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | Most simple credential Usually password together with username Usually password case-sensitive, while username not; it depends To increase security Brute-force attacks: use longer password, both lower/upper case chars, also numbers and specials chars … Salt – example: password ADMINISTRATOR: easily recognizable, if hash value known – but not if salt was added! Salt: different systems  different salts  use of same password not recognizable OTP: with list - example: TANS with online banking To indirect influence resistance: restrict number of login attempts, whereupon system refuses further attemps
  5. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | X.509 introduces hierarchical PKI First introduce CA and Root CA CA: issues certs for other CA or for a subject (i.e. user or firm) Root CA: is trusted in the first place, cert build-in in popular browsers Verification: start at bottom (pic), verification recursive loop until Root CA If private key stolen/public, need to avoid missuse  CRL List adress embedded into every certificate Check, if cert is on the regarding CRL
  6. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | Subject data Subject name (X.500) Unique serial number (unique per CA) Issuer Issuer name (X.500) Validity period (when to let issue a new cert) Fingerprint NOT VISIBLE: Version NOT VISIBLE: Subject‘s public key (needed for) NOT VISIBLE: Signature by issuer NOT VISIBLE: Extensions (since v3)
  7. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | Unique object identifier (for recognition) Data Value represented as string Criticality flag; behaviour if an extension is not supported List of used extensions of a subject certificate Extension „Certificate Key Usage“ – not critical; certificate should only be used for signing and key encipherment users with application, which does not support extension, would not accept cert, if critical
  8. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | computation/verification of checksums/signatures, hashing, encryption/decryption, verification of CVCs no need to rely on computer security (viruses, trojan horses) Less space, because no XML tags, but short tags (2 or 4 digits long) Header values: tags + lengths
  9. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | Every day situation – use of several services (email, online banking, blogging) User has to remember only one password How is auth info exchanged? Cookies: not possible across different domains Proprietary solution: possibly incompatible Short abstract – more details later by other seminar group
  10. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | More abstract exchange User uses service of an IdP, then information communicated to RP Protocols – for the regarding features of SAML i.e. Assertion Query and Request Protocol; Authentication Request Protocol Bindings Embed SAML messages into HTML POST requests, HTML forms, SOAP messages Profiles i.e. Web Browser SSO Profile ???
  11. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | Authentication: subject was authenticated by a particular means at a particular time Attribute: exchange of attributes regarding a subject (requests with specified criteria possible) Authorization decision: access to a specific ressource allowed for a subject? signatures and encryption possible with common used algorithms Subject confirmation data: confirm relationship of subject to assertion issuer Conditions: i.e. validity period, allow only one-time use Extensions: At many points (so no further explanations)
  12. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | All requests performed via HTTP Endpoint discovery: special path at domain of identifier Authentication, if no previous authentication to the OP
  13. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | No other services beyond that (but of course by extensions) To increase security … signatures possible Encryption not by OpenID itself, but by using SSL/TLS (OpenID messages unencrypted) Extension possible – but only key-value pairs AX: fetch/store attributes (like in SAML); representable as string PAPE: provider may request special policies, i.e. Phishing-resistant authentication to OP; time value, after which explicit reauthentication is required SREG: transfer by RP selected personal details (name, adress, date of birth, email adress)
  14. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  15. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  16. 16/3/2011 | | 16/3/2011 | |
  17. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | People almost certainly carry a Plastic Card around in their wallet. Perhaps they travel with a Railway Card, make calls with a Telephone Card, pay with a Credit Card, or obtain cash from an automatic teller machine using Eurocheque Card. All these Plastic Cards may be the same size, but sometimes have completely different functions [29]. We describe now different types of Plastic Card, and how they can be used as an HSM. 16/3/2011 | |
  18. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  19. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | Chip Cards The Chip Card (Figure 3) is more powerful than a simple Magnetic Stripe Card. These can be usually recognised by a gold-coloured metal contact surface about the size of a fingermail on the front (there are also non-contact Chip Cards, but these are not of interest here). Telephone Cards are the most well-known example of this species of Plastic Card. Behind the contact surface on a Chip Card there is a hardware chip, which is markedly more powerful than a magnetic stripe [29]. There are two kinds of Chip Card: Memory Card and Smart Card (externally these are the same) [29]. On a Memory Card, the chip is only used to store data and is not able to compute or control access to the stored data. A Smart Card, on the other hand, is a miniature computer: it has a processor, a genuine read-only memory (ROM), a working memory (RAM) and an electronically erasable programmable memory (EEPROM). These components are coordinated by a special Smart Card operating system. Input and output is possible via the contact surface on the front. Smart Cards nowdays typically have 16 Kbyte ROM, 2Kbyte EEPROM and several hundred bytes of RAM available [29]. 16/3/2011 | |
  20. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  21. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | Smart Cards have the drawback that they are useless without a reading device. As yet, however, only a few PCs and other machines have been equipped with them, which is why many users are looking for an alternative [29]. For authentication purposes there is an alternative in the form of the so-called smart token. A smart token is a small object with an inbuilt computer chip and a display. Most smart tokens look like a small pocket calculator, although some are in the form of wrist watches or key fobs. Many smart tokens have a keyboard, making them more likely to be mistaken for a pocket calculator. With a smart token, for example, the user Alice can authenticate herself through a challenge-response [8] protocol, without owning a Smart Card reader and without the software with cryptographic functions. Smart tokens are thus a secure alternative to passwords. To explain how a smart token works, we assume that Alice wants to access her online account at Cryptobank and uses a smart token to achieve this. Typically this works as follows 16/3/2011 | |
  22. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  23. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  24. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  25. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  26. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  27. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  28. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  29. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  30. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  31. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  32. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  33. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  34. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  35. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  36. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  37. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  38. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  39. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |
  40. 16/3/2011 | | 16/3/2011 | | 16/3/2011 | |